Portal en español sobre Tecnologías de Identificación

18:00 - 19:00 hs GMT+1

Teams using your app will be able to edit the same rich text document, and see each other’s edits (character-by-character) in real time, directly inside Froala. Join us for our webinar and learn how any developer can deploy this capability with just a few lines of JavaScript code.

Protecting business data and ensuring continuity are top-of-mind priorities for IT professionals as their organizations navigate the new normal of working remotely. Cloud data protection offers the reliability, flexibility, and cost savings that organizations need to adapt quickly.
How flexible (...)

Protecting business data and ensuring continuity are top-of-mind priorities for IT professionals as their organizations navigate the new normal of working remotely. Cloud data protection offers the reliability, flexibility, and cost savings that organizations need to adapt quickly.
How flexible (...)

On June 1st watch the first in our series of video webinars discussing the concept of the ‘net zero reset’. Where is the future post coronavirus going to take us?
Into a new world, where we now invest only in the (...)

Transitioning into a green economy has been well documented, however the current Covid-19 pandemic has forced many businesses to reflect on their current priorities and processes. With many corporations finding their futures uncertain, is striving for net zero in a (...)

Transitioning into a green economy has been well documented, however the current Covid-19 pandemic has forced many businesses to reflect on their current priorities and processes. With many corporations finding their futures uncertain, is striving for net zero in a (...)

This Webinar is a continuation of Final Revised Version of BioPhorum Extractable Testing Recommendation Part 1
Since the first publication of BioPhorum (previously known as BPOG) Extractable Testing Recommendation in 2014, the combined team of end-users and suppliers has collaborated to (...)

Join us for a webinar co-presented by Microsoft and Barracuda, and discover how to:
• Secure your applications and data in Microsoft Azure
• Easily protect data with backup and recovery built for Office 365
Plus, get answers to all your (...)

Join us for a webinar co-presented by Microsoft and Barracuda, and discover how to:
• Secure your applications and data in Microsoft Azure
• Easily protect data with backup and recovery built for Office 365
Plus, get answers to all your (...)

Software-as-a-service applications like Confluence, Jira, and Salesforce have arisen as indispensable tools. Confluence and Jira work in unison to provide organizations a big-picture perspective on development, tracking, and documentation. Meanwhile, Salesforce delivers CRM services that allow organizations to bring these (...)

Nuix Discover Power User Webinar Series
Nuix Discover includes powerful functionality that allows legal teams to build custom applications on top of the Nuix Discover database. Watch this session to see Nuix Discover Product Owner David Stromberg demonstrate how to achieve (...)

"Trusted” Websites Are Not as Safe as First Thought!
Today, attackers leverage the web’s ubiquity and users’ trust to infect devices and propagate malware. Website categorization has been compromised. Phishing and spear-phishing attacks drive today’s most significant data breaches, and clicking (...)

The 2020 Open Source Security and Risk Analysis report looks at the state of open source use in over 1,250 distinct applications created by organizations in 17 industries. As we’ve seen in past years, the use of open source in (...)

Accuracy and solution time are two of the most critical concerns in computational fluid dynamics (CFD) simulation, and both greatly depend on the characteristics of the mesh. Different types of meshing elements are needed to deliver optimal performance in resolving (...)

In today's ever-changing threat landscape, it is more important than ever to use a cyber hygiene routine to help prevent hackers, intelligent malware, and advanced viruses from accessing and corrupting your company's data.
How do validate that your cyber strategy (...)

Software-as-a-service applications like Confluence, Jira, and Salesforce have arisen as indispensable tools. Confluence and Jira work in unison to provide organizations a big-picture perspective on development, tracking, and documentation. Meanwhile, Salesforce delivers CRM services that allow organizations to bring these (...)

Software-as-a-service applications like Confluence, Jira, and Salesforce have arisen as indispensable tools. Confluence and Jira work in unison to provide organizations a big-picture perspective on development, tracking, and documentation. Meanwhile, Salesforce delivers CRM services that allow organizations to bring these (...)

On June 2nd watch the second in our series of video webinars discussing the concept of the ‘net zero reset’. Where is the future post coronavirus going to take us?
Into a new world, where we now invest only in the (...)

Space system engineering assures that mission risks and costs are low. The operational harsh environment and its effect on the space systems require a good understanding of how space systems structures, propulsion systems, mechanisms, and software will behave and operate (...)

As the world locks down to mitigate the risks of COVID-19, many employees are still adjusting to working from home, and companies like yours are working hard to support it. However, organizations cannot completely lock down their networks. For example, (...)

We are pleased to be joined by the Royal Bank of Scotland (RBS) who will provide insight into their energy management journey and how they have progressed from a desire to improve systems and reduce costs, to setting ambitious energy (...)

In the last 24 months, the security industry has seen a great deal of consolidation, disappearance and evolution. In a world where threats are changing by the day, how can you make sure you stay relevant and prepared? Join Zeki (...)

In the last 24 months, the security industry has seen a great deal of consolidation, disappearance and evolution. In a world where threats are changing by the day, how can you make sure you stay relevant and prepared? Join Zeki (...)

VER VIDEO
On June 02, Technology Evaluation Centers and IT Latino, present four experienced and informed speakers offering their perspectives on how Information Technology is adapting to a world in the throes of unprecedented change.
Since the beginning of the digital revolution, (...)

The use of application control (also known as whitelisting) is considered to be a robust and essential Cloud Workload Protection strategy largely due to the high predictability of cloud environments.
But it does not prevent all cyber attacks. Attackers can (...)

The use of application control (also known as whitelisting) is considered to be a robust and essential Cloud Workload Protection strategy largely due to the high predictability of cloud environments.
But it does not prevent all cyber attacks. Attackers can (...)

Today, operational technology (OT) and industrial systems are an important element of modern life. From product manufacturing through to oil, gas and transport networks computer-controlled processes and operations reduce costs and improve productivity.
Managing these assets to ensure better (...)

Today, operational technology (OT) and industrial systems are an important element of modern life. From product manufacturing through to oil, gas and transport networks computer-controlled processes and operations reduce costs and improve productivity.
Managing these assets to ensure better (...)

This webinar focuses on Alert Logic’s manual threat hunting activities using the example of a Citrix RCE vulnerability (CVE-2019-19781) which, at the time, was an emerging threat with no proof of concept (PoC), indicators of compromise (IoC) or indicators of (...)

In this webinar we discuss the challenges facing energy users and suppliers as they attempt to navigate energy markets during the Covid-19 crisis – without losing focus on their long-term net-zero goals. While historically low energy pricing in forward markets (...)

As an organization's hybrid-cloud environment continues to expand far and wide beyond their control, the need for a zero-trust model is becoming mandatory. This higher level of digital security morphs identity verification from onetime event to a model where nothing (...)

The webinar discusses detection of traffic rules violation using the Edge capabilities of the OpenNESS platform.
There are a variety of possibilities emerging from the edge automation platform, and so this concept has been developed leveraging the OpenNESS platform.
The (...)

The webinar discusses detection of traffic rules violation using the Edge capabilities of the OpenNESS platform.
There are a variety of possibilities emerging from the edge automation platform, and so this concept has been developed leveraging the OpenNESS platform.
The (...)

SusCritMat is a European Institute of Innovation & Technology (EIT) RawMaterials funded education project which develops teaching modules on critical raw materials and their sustainable management, taking into account the different perspectives as well as the entire value chain.
This webinar (...)

As products become more complex, with more stakeholders involved, capturing requirements from multiple sources and keeping them up to date as they change becomes more challenging.
How can you ensure that requirements are met throughout the product lifecycle – from design (...)

This webinar covers the fundamentals of finite element analysis (FEA), including concepts such as nodes, elements, meshing and modeling considerations.
Intended for individuals using the Ansys platform for the design and modeling of electronic components and systems, this webinar will explain (...)

This is the world's largest virtual event for construction and will welcome 100+ speakers and 1000s of digital construction professionals from across the globe.
There is no cost to join and all sessions are CPD accredited. Online presentations and panel discussions (...)

Announced at the Vertica Big Data Conference 2020, Vertica 10 includes many features for deriving greater insight by unifying data siloes across cloud and hybrid environments. Join us for this Webcast to learn how Vertica 10 now supports PMML format (...)

Announced at the Vertica Big Data Conference 2020, Vertica 10 includes many features for deriving greater insight by unifying data siloes across cloud and hybrid environments. Join us for this Webcast to learn how Vertica 10 now supports PMML format (...)

In financial services, health care and other highly-regulated industries, specific rules govern marketing communications and advertising practices when communicating with the public. These regulations put employees squarely in the spotlight of various risks and responsibilities. So how can you mitigate (...)

In financial services, health care and other highly-regulated industries, specific rules govern marketing communications and advertising practices when communicating with the public. These regulations put employees squarely in the spotlight of various risks and responsibilities. So how can you mitigate (...)

In financial services, health care and other highly-regulated industries, specific rules govern marketing communications and advertising practices when communicating with the public. These regulations put employees squarely in the spotlight of various risks and responsibilities. So how can you mitigate (...)

Telco markets worldwide are highly competitive. Consumers have more options than ever to satisfy their telecommunications needs and are highly portable. This means providers are competing harder, and paying closer attention to critical factors like cost of customer acquisition, average (...)

Issuu Marketing Manager, Meghan Cole and special guest Allié McGuire, Co-founder and Co-owner at Awareness Ties, a social impact platform that raises awareness for causes, while providing resources for the general public and funding for nonprofits. will discuss:
- How to (...)

Discover how the themes of computational storage, persistent memory, and solid state come together in a webcast from the new SNIA Compute, Memory, and Storage Initiative. We’ll explore how expertise in these three areas can help understand storage (...)

Discover how the themes of computational storage, persistent memory, and solid state come together in a webcast from the new SNIA Compute, Memory, and Storage Initiative. We’ll explore how expertise in these three areas can help understand storage (...)

Discover how the themes of computational storage, persistent memory, and solid state come together in a webcast from the new SNIA Compute, Memory, and Storage Initiative. We’ll explore how expertise in these three areas can help understand storage (...)

Discover how the themes of computational storage, persistent memory, and solid state come together in a webcast from the new SNIA Compute, Memory, and Storage Initiative. We’ll explore how expertise in these three areas can help understand storage (...)

Discover how the themes of computational storage, persistent memory, and solid state come together in a webcast from the new SNIA Compute, Memory, and Storage Initiative. We’ll explore how expertise in these three areas can help understand storage (...)

Discover how the themes of computational storage, persistent memory, and solid state come together in a webcast from the new SNIA Compute, Memory, and Storage Initiative. We’ll explore how expertise in these three areas can help understand storage (...)

Discover how the themes of computational storage, persistent memory, and solid state come together in a webcast from the new SNIA Compute, Memory, and Storage Initiative. We’ll explore how expertise in these three areas can help understand storage (...)

Data science is a differentiator (or secret weapon) for many companies today. Make data science your superpower and bask in the glory of saving the day.
Much like superheroes, demand for data scientists outstrips supply. That shortage is due largely (...)

As communities around the world start to discuss reopening, it poses a lot of questions for organizations:
Is the virtual workforce here to stay, and what does it mean for your security posture? Which of the emergency security practices you enacted (...)

Azure Pipelines is a component of Azure DevOps, both in the cloud and self-host in your data center that allows you to continuously build, test, and deploy to any platform, any cloud, for apps written in any language. In this (...)

The current pandemic has forced all organisations to face into the new normal. The survivors are already restarting by adapting to new market opportunities, optimising change and preparing for uncertainty. This dramatic shift has also changed the face of digital (...)

The current pandemic has forced all organisations to face into the new normal. The survivors are already restarting by adapting to new market opportunities, optimising change and preparing for uncertainty. This dramatic shift has also changed the face of digital (...)

The current pandemic has forced all organisations to face into the new normal. The survivors are already restarting by adapting to new market opportunities, optimising change and preparing for uncertainty. This dramatic shift has also changed the face of digital (...)

At Rapid7, we’re obsessed with giving our customers, prospects, and the industry as a whole the knowledge, tools, and telemetry to achieve positive outcomes within their security programs.
In our latest threat telemetry data analysis we look at how internet-exposed systems (...)

Digital transformation has now become an important strategic choice for business and governments to deliver secure and fit for purpose solutions fast. Implementation methodologies like Agile and DevOps are tools in this transformational tool kit. You and your team’s (...)

Digital transformation has now become an important strategic choice for business and governments to deliver secure and fit for purpose solutions fast. Implementation methodologies like Agile and DevOps are tools in this transformational tool kit. You and your team’s (...)

Digital transformation has now become an important strategic choice for business and governments to deliver secure and fit for purpose solutions fast. Implementation methodologies like Agile and DevOps are tools in this transformational tool kit. You and your team’s (...)

Allan Waddell and Angus Dorney, co-CEOs of Kablamo, will walk through lessons learned from taking Australia’s largest banks, media companies and fintechs on digital transformation journeys. They’ll share the common mistakes that these experiences revealed and the things that enterprises (...)

Allan Waddell and Angus Dorney, co-CEOs of Kablamo, will walk through lessons learned from taking Australia’s largest banks, media companies and fintechs on digital transformation journeys. They’ll share the common mistakes that these experiences revealed and the things that enterprises (...)

Allan Waddell and Angus Dorney, co-CEOs of Kablamo, will walk through lessons learned from taking Australia’s largest banks, media companies and fintechs on digital transformation journeys. They’ll share the common mistakes that these experiences revealed and the things that enterprises (...)

Internet of Things (IoT) and connected devices promise tremendous benefits and a new wave of business opportunities. This hype is best balanced with caution especially with respect to security. Along with new revenue opportunities, IoT introduces points of vulnerability (...)

Contents at a glance: Get an overview of the possibilities and ways of Industry 4.0 – starting with how you can benefit from IO-Link. IO-Link is a key pillar in the path to Industry 4.0. What exactly is it? And (...)

Contents at a glance: Get an overview of the possibilities and ways of Industry 4.0 – starting with how you can benefit from IO-Link. IO-Link is a key pillar in the path to Industry 4.0. What exactly is it? And (...)

Technology is disrupting every known way of life , and shaking people
and processes out of comfort zone, through its propensity for
exponential change. Human Resource management is no exception.
However certain fundamental questions need to be answered.
* Is technology subsuming the HUMAN (...)

Technology is disrupting every known way of life , and shaking people
and processes out of comfort zone, through its propensity for
exponential change. Human Resource management is no exception.
However certain fundamental questions need to be answered.
* Is technology subsuming the HUMAN (...)

Introducing the Anytime Upgrade program, a flexible way for customers to expand and enhance their PowerStore appliance. Anytime Upgrades combines the best of our product and services capabilities to deliver a powerful competitive advantage.
With that in mind, we see enormous (...)

Introducing the Anytime Upgrade program, a flexible way for customers to expand and enhance their PowerStore appliance. Anytime Upgrades combines the best of our product and services capabilities to deliver a powerful competitive advantage.
With that in mind, we see enormous (...)

On June 3rd watch the third in our series of video webinars discussing the concept of the ‘net zero reset’. Where is the future post coronavirus going to take us?
Into a new world, where we now invest only in the (...)

On June 3rd watch the third in our series of video webinars discussing the concept of the ‘net zero reset’. Where is the future post coronavirus going to take us?
Into a new world, where we now invest only in the (...)

In this webinar, we will discuss how you can seamlessly combine multiple design disciplines to deliver the best medical device products to market faster.
With ever-evolving complexity and lengthy certification cycles, medical device companies are constantly looking for new and innovative (...)

All businesses have faced huge challenges and disruption due to the Coronavirus pandemic. Many large multi-sited businesses have had to close their doors at short notice and face an unknown period of time before being able to reopen.
Energy is (...)

Hear insights from a Menlo Security customer, along with John Pescatore, Director of Emerging Technologies at SANS Institute, and Kowsik Guruswamy, Menlo Security CTO, as they explore why organizations around the globe are looking at isolation as the means to (...)

Automating the optimization of engineering structures or systems could save you considerable material cost and planning time. We will show you how to set up such an automated analysis for a machine tool part simulated with Ansys Mechanical.
Using sensitivity analysis (...)

#SASatHome, the online version of a renowned Security Analyst Summit took place on 28-30, April. Watch one of the highlights of the event – the talk by Costin Raiu, the director of Kaspersky’s Global Research and Analysis Team (GReAT) dedicated (...)

The use of in-line Raman spectroscopy as an in-line process analytical technology (PAT), in the biotechnology industry, has matured over the past decade from a technology with promise to a standard tool for real-time, continuous monitoring of cell culture processes. (...)

Demands to reduce environmental impact affects every part of any business. Everyone needs accurate data to make decisions and plan within a green and sustainable framework. Often existing business tools don’t or can’t share the environmental information needed to (...)

Demands to reduce environmental impact affects every part of any business. Everyone needs accurate data to make decisions and plan within a green and sustainable framework. Often existing business tools don’t or can’t share the environmental information needed to (...)

Demands to reduce environmental impact affects every part of any business. Everyone needs accurate data to make decisions and plan within a green and sustainable framework. Often existing business tools don’t or can’t share the environmental information needed to (...)

Demands to reduce environmental impact affects every part of any business. Everyone needs accurate data to make decisions and plan within a green and sustainable framework. Often existing business tools don’t or can’t share the environmental information needed to (...)

Please join us to explore how Sixgill and Cortex XSOAR are enabling customers to scale and accelerate their incident prevention and response by combining deep and dark web intelligence with automation. Building simple, automated & effective cyber security, and executing (...)

When stay-at-home work orders came down, enterprise IT administrators were under immediate stress to make sure that the required IT resources – VDI, augmented security/data protection systems and cloud services – were all within immediate reach.
Enterprise IT’s response to (...)

In the electronics industry, the quality and reliability of a printed circuit board (PCB) is highly dependent upon the capabilities of the PCB fabrication suppliers. As such, the design engineer needs to understand the processes involved in designing and fabricating (...)

To many, the switch to a remote workforce is a huge change with a new set of obstacles. The existing programs and procedures that compliance teams have put in place to protect businesses and identify risk were not designed for (...)

The Insurance industry is facing major disruptions from trends including expectations of more personalised and engaging services, the rise of virtual platforms and insurtech competitors and the use of machine learning / AI. As IDC wrote, "Insurers that fail to (...)

In this webinar, we will discuss the creation of a real-time subscriber campaign engine built on Apache Ignite(R) and Teradata for one of the most important telecommunication companies.
The telecommunications company deployed a recommendation engine that provides over 7,000,000 relevant marketing (...)

With the sudden but important transition to remote work, many eDiscovery professionals are struggling to find their footing in a way that will set them up for long-term success. They need secure access and the ability to control their workflows. (...)

SD-WAN is a relatively new technology compared to routing, switching constructs. SD-WAN started off with the goal of reducing MPLS costs by utilizing lower cost Internet/public WAN links. While this still holds true today, the use cases for SD-WAN have (...)

Cloud access security brokers (CASBs) have emerged as go-to solutions for organizations to secure their cloud services. CASBs provide a breadth and depth of functionality that is indispensable for securing your data across applications, devices and networks.

Cloud access security brokers (CASBs) have emerged as go-to solutions for organizations to secure their cloud services. CASBs provide a breadth and depth of functionality that is indispensable for securing your data across applications, devices and networks.

We face unprecedented times as security teams race to enable the rapid digital transformation efforts of organizations while also protecting them from the creative advances of threat actors.
LookingGlass researchers are seeing a dynamic start to 2020 as they monitor major global events, (...)

We face unprecedented times as security teams race to enable the rapid digital transformation efforts of organizations while also protecting them from the creative advances of threat actors.
LookingGlass researchers are seeing a dynamic start to 2020 as they monitor major global events, (...)

ValueOps is a powerful integration of Clarity and Rally software creating an industry-leading Digital Business & Agile Management Solution. Find out how ValueOps can have a substantial impact across your organization by removing the historic silos between business and IT. (...)

The cyber attackers hit their mark: now what do you do? Whom do you call first? Do you have a plan to contain the damage, eliminate the threat, avoid destruction of forensic evidence, and keep the business operational at the (...)

The cyber attackers hit their mark: now what do you do? Whom do you call first? Do you have a plan to contain the damage, eliminate the threat, avoid destruction of forensic evidence, and keep the business operational at the (...)

Join Qualcomm Technologies for an informative webinar on how next-generation, high-performance computing architectures are vital to helping drive development of safer, more capable autopilot systems.
During this webinar you will learn:
- How meeting these compute requirements within specific thermal envelopes is (...)

Transformation has brought vast benefits to many organisations. Yet, it’s about balancing risk and reward. As organisations open up the perimeter fence so to speak, the more opportunity there is for threats and risks to penetrate the business.
Consider this, from (...)

Ponemon 2020 Cost Report for Insider Threats: Key Takeaways and Trends
How much could Insider Threats cost your company annually? $11.45M, according to a new report from the Ponemon Institute, up from $8.76M in 2018. Ponemon’s 2020 Cost of Insider Threats (...)

Today's advanced 16/7/3nm SoCs are faced with increased variation effects as they push for lower power. While the sizes of the transistors continue to shrink following Moore's Law, the threshold voltages fail to continue to scale.
Traditionally, dynamic voltage drop (DvD) (...)

Designing hybrid electric vehicles of tomorrow means predicting and balancing the performance of various attributes, such as fuel economy, power, comfort, and drivability. Getting insights early in the development cycle is valuable as multiple iterations of different hardware configurations and (...)

Every organisation wants to focus on the right things. For many, those include increased innovation, lower costs and minimised risk. But these can be tough when struggling with expensive legacy database technology and infrastructure that lacks modern features and capabilities. (...)

Join Alfresco and our executive team for the "virtual" annual conference, Alfresco Modernize 2020. This event will be focused on how Alfresco is solving for modernization projects with our scalable, cloud-native content services platform and tailored solutions.
Why you should attend:
- (...)

Cloud access security brokers (CASBs) have emerged as go-to solutions for organizations to secure their cloud services. CASBs provide a breadth and depth of functionality that is indispensable for securing your data across applications, devices and networks.
Yet not all CASBs (...)

On June 4th watch the fourth in our series of video webinars discussing the concept of the ‘net zero reset’. Where is the future post coronavirus going to take us?
Into a new world, where we now invest only in the (...)

On June 4th watch the fourth in our series of video webinars discussing the concept of the ‘net zero reset’. Where is the future post coronavirus going to take us?
Into a new world, where we now invest only in the (...)

Heavy equipment (HE) manufacturers and their suppliers are leading with innovations to the product line to meet their customer demands for a safe and quality product.
As they face more complex business requirements, HE manufacturers are driving with a more strategic (...)

If you are considering implementing a Product Information Management system in your business, join this PIM webinar to get clarified.
Do you recognize any of the signs listed below?
- Product information is scattered across the organization
- You spend a lot of (...)

Carl Baron CISO of SIG, a major international supplier of specialist construction products will talk about his experience working with CrowdStrike from initial implementation and deployment to his plans for future.

Carl Baron CISO of SIG, a major international supplier of specialist construction products will talk about his experience working with CrowdStrike from initial implementation and deployment to his plans for future.

IMServ, the leading independent Metering and Data provider in the half-hourly, non-half-hourly and sub-metering electricity and multi-utility market will provide you some key insight into Net Zero in today’s ever changing challenging market. Providing detail on why customers need to (...)

IMServ, the leading independent Metering and Data provider in the half-hourly, non-half-hourly and sub-metering electricity and multi-utility market will provide you some key insight into Net Zero in today’s ever changing challenging market. Providing detail on why customers need to (...)

Systems are moving to the cloud faster than ever. So how can you protect your organisation’s data when it moves from the inside out?
As an IT leader, your responsibilities include ensuring there are adequate controls to protect your (...)

The coronavirus pandemic has triggered a new era that now sees organisations, employees and the public embracing information technology more than ever before. Technology has become an indispensable part of our lives, facilitating everything from the way business is (...)

For the first time ever, experience live the two worlds of CATIA® and SOLIDWORKS® joining forces in a single environment: the 3DEXPERIENCE® platform on the cloud.
Discover our portfolio of ready-to-go online Design and Engineering applications in action, which enable you (...)

In the world of enterprise cloud, multi-cloud strategies can be sophisticated. This webinar will discuss cost-savings in the cloud utilizing advanced tools for multi-cloud deployment for reducing CapEx and OpEx while streamlining processes and optimizing revenue cycles.

In the world of enterprise cloud, multi-cloud strategies can be sophisticated. This webinar will discuss cost-savings in the cloud utilizing advanced tools for multi-cloud deployment for reducing CapEx and OpEx while streamlining processes and optimizing revenue cycles.

Energise will discuss why putting sustainability/net zero at the centre your decisions is always a good idea and how you can deliver significant extra outcomes by making sure you consider the long term benefits of your actions during your COVID-19 (...)

This session will focus on how Prognosis can help teams remain connected during these unique times,cover use cases such as License Auditing & Alerting, Endpoint Registration, and User Experience from Home.
Hosted by Annie Leduc, one of our Senior Solutions Engineers, (...)

Autosys is releasing Version 12 with many new features you should know about. Please join us and learn about new facilities to automate in multi-cloud environments, integrate to Privileged Access Management tools, simplify upgrade and installation and much (...)

What are the top performing organizations doing differently to almost double their proactive detection of performance issues of and improving MTTR by 4X? Join us for this webinar on June 4th, 2020 to learn how IT Ops teams are (...)

Join AppDirect and signNow to hear how they are helping businesses succeed amid the current COVID-19 environment. Learn firsthand how your customers can increase productivity, maximize ROI, and save money by adding signNow to your marketplace. signNow will also touch (...)

To deliver a new mobility experience, 30% of vehicle content will be software by 2030 (McKinsey).
However, snowballing complexity is impacting automotive functional safety as evidenced by increasing vehicle recalls. Thus, it is critical that the software tools used to (...)

Hydraulic systems must perform as designed, especially in safety-critical applications. Ansys Twin Builder can help you easily and more efficiently design hydraulic systems that will operate as expected, and reduce your design efforts and time to market.
This webinar covers:
- the (...)

SAP S/4HANA represents a major step forward in enterprise resource planning (ERP) software, and with support ending in 2025 for ECC 6.0, now is the time to begin planning your migration. Traditionally, migrations are costly, complex, multi-year projects that introduce (...)

Over the last ten years, IT has stood at the epicenter of dramatic changes, as the cloud has forced businesses to rethink how they can best serve their customers and employees.
Many IT organisations have gone all-in with a ‘cloud first’ (...)

Building an information security program that meets the business needs of your organization and its continuance, while protecting the institution’s assets, is a venture all CISO’s have to endure. During this webinar, a bank CISO with over 25 years of (...)

Numerous M&A transactions have recently been put on hold while the parties wait to see what happens. Travel bans, quarantines, social distancing, closures of nonessential businesses, and shelter-in-place orders make it impossible to conduct due diligence in a normal fashion. (...)

You are certainly not in Kansas anymore! With the rise in open source options for data distribution, stream processing, IoT, and messaging, what’s a person to do when choosing the best solution for enterprise communications requirements?
What use cases (...)

Stolen payment card information usually needs to be validated before they can be used to run larger fraudulent transactions or be sold on the black market. Typically, automated bots run these tests or validation through smaller websites that lack anti-bot (...)

Cloud adoption has many benefits, including improved resilience, reduced cost of ownership, and greater infrastructure and business agility. However, many organizations remain concerned about providing adequate security and privacy for applications and data in cloud environments.
An operating system for the (...)

Join ZyLAB’s Corporate eDiscovery Director, Jeffrey Wolff, for a tour of some of the latest cutting-edge new features being implemented in ZyLAB ONE. Legal Hold, Named Entity Analytics, Office 365 Cloud Collection, Machine Translation and Audio Transcription are among (...)

Join ZyLAB’s Corporate eDiscovery Director, Jeffrey Wolff, for a tour of some of the latest cutting-edge new features being implemented in ZyLAB ONE. Legal Hold, Named Entity Analytics, Office 365 Cloud Collection, Machine Translation and Audio Transcription are among (...)

Join ZyLAB’s Corporate eDiscovery Director, Jeffrey Wolff, for a tour of some of the latest cutting-edge new features being implemented in ZyLAB ONE. Legal Hold, Named Entity Analytics, Office 365 Cloud Collection, Machine Translation and Audio Transcription are among (...)

Are you getting all you can out your PowerVault ME4? Even as an entry-level array, it empowers businesses to be able to support a variety of use cases including HPC, Surveillance, Backup/Recovery, Virtualization, VDI, and more. In this webinar session, (...)

Executives operating major network providers, consultancies, and technology platforms will discuss the state of network buying and selling and predictions as to how the space will evolve against the backdrop of major trends over the next few years.
You’ll hear from (...)

Executives operating major network providers, consultancies, and technology platforms will discuss the state of network buying and selling and predictions as to how the space will evolve against the backdrop of major trends over the next few years.
You’ll hear from (...)

Are you struggling to find IT budget to drive new business initiatives in 2020? Learn how to reduce your AWS spend while still meeting demand. We’ll cover technical and organizational strategies, as well as show first-hand how analytics tools like (...)

This is the world's largest virtual event for construction and will welcome 100+ speakers and 1000s of digital construction professionals from across the globe.
There is no cost to join and all sessions are CPD accredited. Online presentations and panel discussions (...)

As communities around the world start to discuss reopening, it poses a lot of questions for organizations:
Is the virtual workforce here to stay, and what does it mean for your security posture? Which of the emergency security practices you enacted (...)

On June 5th watch the last in our series of video webinars discussing the concept of the ‘net zero reset’. Where is the future post coronavirus going to take us?
Into a new world, where we now invest only in the (...)

On June 5th watch the last in our series of video webinars discussing the concept of the ‘net zero reset’. Where is the future post coronavirus going to take us?
Into a new world, where we now invest only in the (...)

Ansys Fluent is Ansys' flagship product for multi-purpose CFD simulation and is famed for its advanced physics, solver accuracy and wide-ranging applicability to many different fluid flow applications.
The 2020 release of Ansys Fluent brings further advances in solver functionality. Hundreds (...)

To fully capitalise on the power of data, it needs to be put at the heart of the business. This requires a strong data-centric culture that focuses on understanding data at every level of the organisation.
Join Kim Woodward, Head (...)

To fully capitalise on the power of data, it needs to be put at the heart of the business. This requires a strong data-centric culture that focuses on understanding data at every level of the organisation.
Join Kim Woodward, Head (...)

Pete looks at energy management both historically and currently and offers an insight into how the sector might differ post-Covid 19. Ranging from an introductory geopolitical outlook through to historical challenges and impacts and on to leading edge, ground-breaking technologies (...)

Every large corporate is looking at how to manage their carbon data and select from the mix of technologies and systems out there. You may have already bought or be thinking of buying systems to help. But, is it possible (...)

Every large corporate is looking at how to manage their carbon data and select from the mix of technologies and systems out there. You may have already bought or be thinking of buying systems to help. But, is it possible (...)

As security teams continue to evolve, adapt, and innovate at a rapid rate, the struggle to balance increasing workloads with limited resources, complex ecosystems, and rising threats has never been greater. Security orchestration and automation (SOAR) helps teams improve (...)

Technological progress, new devices and tools have evolved in the past 40 years, but how did the methods and targets actually change? What is new?
Watch a quick overview of how hacking has changed over the past decade presented by David (...)

Organizations trust Hitachi Vantara with their most important business asset: data.
They know our storage solutions are fail-safe. Hitachi storage platforms are time tested, with proven performance, reliability, and scalability.
A brand new set of incredible systems, solutions, and services innovations of (...)

Security has played a positive role in enabling business over the recent weeks. This has been demonstrated by allowing remote workforces to remain productive and the hard work of security teams to keep operations running. However all this is putting (...)

With the rise of mobile and social technologies, customers are more knowledgeable and empowered than ever before. Their ability to access and share information gives them enormous control—and they know it.
As a result, they expect data-driven, personalized interactions at (...)

With the rise of mobile and social technologies, customers are more knowledgeable and empowered than ever before. Their ability to access and share information gives them enormous control—and they know it.
As a result, they expect data-driven, personalized interactions at (...)

Cloud access security brokers (CASBs) have emerged as go-to solutions for organizations to secure their cloud services. CASBs provide a breadth and depth of functionality that is indispensable for securing your data across applications, devices and networks.
Yet not all CASBs (...)

A recent SANS study showed that while organizations used threat intelligence to hypothesize where attackers may be found, they lacked the investigative skills to conduct searches. This continues to be a growing problem in the cyber security industry as organizations (...)

A recent SANS study showed that while organizations used threat intelligence to hypothesize where attackers may be found, they lacked the investigative skills to conduct searches. This continues to be a growing problem in the cyber security industry as organizations (...)

The simplicity of contactless payments is driving fintech adoption by consumers in APAC. The necessity of reducing contact with others - driven by coronavirus - is bolstering adoption as well. But, the challenge in streamlined access is security and fraud, (...)

The simplicity of contactless payments is driving fintech adoption by consumers in APAC. The necessity of reducing contact with others - driven by coronavirus - is bolstering adoption as well. But, the challenge in streamlined access is security and fraud, (...)

The simplicity of contactless payments is driving fintech adoption by consumers in APAC. The necessity of reducing contact with others - driven by coronavirus - is bolstering adoption as well. But, the challenge in streamlined access is security and fraud, (...)

This is the world's largest virtual event for construction and will welcome 100+ speakers and 1000s of digital construction professionals from across the globe.
There is no cost to join and all sessions are CPD accredited. Online presentations and panel discussions (...)

The Synopsys Cybersecurity Research Center (CyRC) has a dedicated team of security analysts who specialize in sourcing, curating, and analyzing open source software vulnerabilities. Their vulnerability feed contains timely, accurate vulnerability reports (Black Duck Security Advisories, or BDSAs) with all (...)

The Synopsys Cybersecurity Research Center (CyRC) has a dedicated team of security analysts who specialize in sourcing, curating, and analyzing open source software vulnerabilities. Their vulnerability feed contains timely, accurate vulnerability reports (Black Duck Security Advisories, or BDSAs) with all (...)

Distributed ML/AI design strategy serves as a potential solution as it solves two of the most notorious problems, performing near real time analytics on humongous high-speed data. Identify Machine Learning models and find means to integrate them in to existing (...)

Distributed ML/AI design strategy serves as a potential solution as it solves two of the most notorious problems, performing near real time analytics on humongous high-speed data. Identify Machine Learning models and find means to integrate them in to existing (...)

When your infrastructure is beginning to age, it can feel like smart technology requires a big investment in order to see any benefit. But as market conditions continue to change dramatically, smart manufacturing offers the chance for a real competitive (...)

Contract negotiations with business partners, external appraisals for project approvals, supplier evaluations: Many processes require you to share and work on documents with external parties.
But how do you keep track of who received and processed which documents and when? Standard (...)

Did you know that 90% of successful cyber-attacks rely on human error by any one member of staff?
It is common to assume that cyber security is the sole responsibility of your IT or security team. However, in many cases all (...)

Development AI and Analytics solutions is a massively complex process, requiring management of vast data sets and data management capabilities. In turn, this leads to subsequent iterative development using algorithm performance testing against defined test cases, and development of real-time (...)

Development AI and Analytics solutions is a massively complex process, requiring management of vast data sets and data management capabilities. In turn, this leads to subsequent iterative development using algorithm performance testing against defined test cases, and development of real-time (...)

In order to stay ahead of an evolving threat landscape, security teams must continuously improve their processes and technology. But even with their investments, security professionals still need answers to pressing questions:
-Who are the attackers that target my industry (...)

Learn how to conduct virtual planning, simulation and analysis of production, using rich production digital twins, that are based on a robust digital thread of engineering and production data.
In the aerospace and defense industry, aircraft systems are becoming more complex, (...)

In order to stay ahead of an evolving threat landscape, security teams must continuously improve their processes and technology. But even with their investments, security professionals still need answers to pressing questions:
-Who are the attackers that target my industry (...)

In order to stay ahead of an evolving threat landscape, security teams must continuously improve their processes and technology. But even with their investments, security professionals still need answers to pressing questions:
-Who are the attackers that target my industry (...)

Traditional ways of looking at data environments don’t work.
There are too many moving pieces, technologies, and data silos. Any digital initiative requires quality, curated data that is readily consumable at the speed of business.
How can you ensure your data ecosystem (...)

Traditional ways of looking at data environments don’t work.
There are too many moving pieces, technologies, and data silos. Any digital initiative requires quality, curated data that is readily consumable at the speed of business.
How can you ensure your data ecosystem (...)

Traditional ways of looking at data environments don’t work.
There are too many moving pieces, technologies, and data silos. Any digital initiative requires quality, curated data that is readily consumable at the speed of business.
How can you ensure your data ecosystem (...)

During the past few months, businesses have had to enable their employees to work from home rapidly so they can continue to serve their customers or resume normal productivity.
Remote work poses a particularly tricky challenge for contact centers and teams (...)

Mandiant Security Validation allows you to accurately assess a company's security posture. We help our clients take a proactive approach to identifying and mitigating risks due to incorrect configurations, inefficiencies in products, and / or established security processes.
Register for the (...)

Successful business initiatives today rely on higher volumes of data — from more sources than ever — processed across divergent, hybrid architectures. And, of course, the quality of that data must be trusted.
With recent studies indicating that 80% of AI (...)

Successful business initiatives today rely on higher volumes of data — from more sources than ever — processed across divergent, hybrid architectures. And, of course, the quality of that data must be trusted.
With recent studies indicating that 80% of AI (...)

Successful business initiatives today rely on higher volumes of data — from more sources than ever — processed across divergent, hybrid architectures. And, of course, the quality of that data must be trusted.
With recent studies indicating that 80% of AI (...)

Successful business initiatives today rely on higher volumes of data — from more sources than ever — processed across divergent, hybrid architectures. And, of course, the quality of that data must be trusted.
With recent studies indicating that 80% of AI (...)

Successful business initiatives today rely on higher volumes of data — from more sources than ever — processed across divergent, hybrid architectures. And, of course, the quality of that data must be trusted.
With recent studies indicating that 80% of AI (...)

Mandiant Security Validation allows you to accurately assess a company's security posture. We help our clients take a proactive approach to identifying and mitigating risks due to incorrect configurations, inefficiencies in products, and / or established security processes.
Register for the (...)

Digital transformation is a broad strategy, applicable across all industries, to solve traditional business challenges and create new opportunities through the use of technology. It requires acceptance of entirely new ways of working and delivering value to customers.
With an expected (...)

2019, was once again a year in which cyber breaches were frequently reported within the UK media, most notably with catchphrases such as 'sophisticated', 'nation-state' and large-scale'. This webinar will expose the reality of today's threats from targeted attacks to (...)

To compete, particularly during times of disruption and accelerated digital transformation, companies need best in class technology, choices that meet their changing needs, and success offerings to capture value faster.
Join Kevin Wrenn, EVP of Products, and Eduarda Camacho, EVP and (...)

Connect to SupportAssist for business PCs – Learn how to maximize your ProSupport Suite for PCs experience
This webinar series shows the SupportAssist for business PCs features as part of the ProSupport Suite for PCs. IT Managers can learn how to (...)

Connect to SupportAssist for business PCs – Learn how to maximize your ProSupport Suite for PCs experience
This webinar series shows the SupportAssist for business PCs features as part of the ProSupport Suite for PCs. IT Managers can learn how to (...)

A pioneer in Emotion AI, Rana el Kaliouby, Ph.D., is Co-Founder and CEO of Affectiva, and author of the forthcoming book Girl Decoded: A Scientist’s Quest to Reclaim Our Humanity by Bringing Emotional Intelligence to Technology.
A passionate advocate for humanizing (...)

Web and application attacks against vulnerable assets that you are aware of are enough a concern - but what if there are legacy assets present in your environment that you aren't aware of? We understand that infrastructure and migration projects (...)

Web and application attacks against vulnerable assets that you are aware of are enough a concern - but what if there are legacy assets present in your environment that you aren't aware of? We understand that infrastructure and migration projects (...)

Supply chains are facing unprecedented volatility and uncertainty. The last six weeks have seen companies stabilize and adapt, but how should you prepare for the new normal? How will you respond when your CEO or Board asks for the roadmap (...)

Electronic assemblies are subject to dynamic loads such as jolts, earthquakes, and other jarring motions. The need to effectively verify the integrity of electronic assemblies and components can be solved by stress and dynamic simulation long before production.
Often, higher-level validation (...)

Webinar 4
data. And now that you’re fully remote, and leveraging the cloud so heavily, accelerating the migration of that data to cloud storage is critical to ongoing productivity.
Join this webinar to learn how your peers are managing the rapid move (...)

Webinar 4
data. And now that you’re fully remote, and leveraging the cloud so heavily, accelerating the migration of that data to cloud storage is critical to ongoing productivity.
Join this webinar to learn how your peers are managing the rapid move (...)

With the change in software development practices from waterfall to Agile to DevOps, the definition of “shift-left” testing needs to expand and evolve just as the entire development lifecycle has evolved. Performance testing is becoming a team sport/effort. Everyone, (...)

Through all industrial revolutions, tools and machinery have been part of workers’ realities. Only relatively recently have IoT technologies digitized these realities. When those digital streams are properly analyzed with streaming analytics and artificial intelligence and then rendered with augmented (...)

Through all industrial revolutions, tools and machinery have been part of workers’ realities. Only relatively recently have IoT technologies digitized these realities. When those digital streams are properly analyzed with streaming analytics and artificial intelligence and then rendered with augmented (...)

The trend toward a more agile, distributed, and mobile workforce was already unmistakable, but the COVID-19 crisis has dramatically accelerated it.
Join Jon Hirschtick, EVP of SaaS and Mike Campbell, EVP of Vuforia, for an interactive discussion.

Microsoft has announced upcoming end of support for the StorSimple 8000 series and there's no time like the present to plan your migration strategy. The good news is by working with Microsoft ISV Nasuni and Azure, you can actually move (...)

Complex cloud environments are a reality for many enterprises and organizations, and managing them is a requirement. But it can be done. Learn firsthand how FireEye delivers world-class capabilities to prevent, detect, and respond to security threats in and from (...)

Complex cloud environments are a reality for many enterprises and organizations, and managing them is a requirement. But it can be done. Learn firsthand how FireEye delivers world-class capabilities to prevent, detect, and respond to security threats in and from (...)

Complex cloud environments are a reality for many enterprises and organizations, and managing them is a requirement. But it can be done. Learn firsthand how FireEye delivers world-class capabilities to prevent, detect, and respond to security threats in and from (...)

The security of Domain Name Server (DNS) infrastructure has never been more critical for service providers and enterprise customers. Subscribers and customers are increasingly aware and concerned about privacy of their on-line communications. Now, with the global pandemic, malicious (...)

The melee of raw data in the various forms of structured, unstructured and semi-structured data has its own unique challenges. Extracting the hidden nuggets of information to meet the vision and aid the strategic and tactical goals of an organization (...)

The melee of raw data in the various forms of structured, unstructured and semi-structured data has its own unique challenges. Extracting the hidden nuggets of information to meet the vision and aid the strategic and tactical goals of an organization (...)

Our recent grid benchmark put the Ext JS Grid to the test against other popular market offerings in a performance benchmark measuring initial load time, filtering speed, and scrolling speed.
Join Sencha product expert Marc Gusmano for a live look at (...)

ADAS, AI, and autonomous vehicles are lumped together, for good reason; they all feed off one another. Can one advance without the other? Probably, but not nearly as seamlessly.
This webinar will look at each of these elements separately, but then (...)

A fundamental need in various industries is to find underlying causal relations and use them to improve the business outlook of companies. All companies bar none would like to understand why their sales are declining, what leads customers to buy, (...)

A fundamental need in various industries is to find underlying causal relations and use them to improve the business outlook of companies. All companies bar none would like to understand why their sales are declining, what leads customers to buy, (...)

A fundamental need in various industries is to find underlying causal relations and use them to improve the business outlook of companies. All companies bar none would like to understand why their sales are declining, what leads customers to buy, (...)

A fundamental need in various industries is to find underlying causal relations and use them to improve the business outlook of companies. All companies bar none would like to understand why their sales are declining, what leads customers to buy, (...)

A fundamental need in various industries is to find underlying causal relations and use them to improve the business outlook of companies. All companies bar none would like to understand why their sales are declining, what leads customers to buy, (...)

ADAS, AI, and autonomous vehicles are lumped together, for good reason; they all feed off one another.
Can one advance without the other? Probably, but not nearly as seamlessly.
This webinar will look at each of these elements separately, but then dive (...)

Kimberly Bryant is the Founder and CEO of Black Girls CODE, a non-profit organization dedicated to “changing the face of technology” by introducing girls of color (ages 7-17) to the field of technology and computer science with a concentration on (...)

With economic uncertainty and an evolving threat landscape, it’s more important than ever for organizations to prove their effectiveness across various operational functions, especially cyber security. Typically, detection and response capabilities are the focus, but becoming more proactive to improve (...)

With economic uncertainty and an evolving threat landscape, it’s more important than ever for organizations to prove their effectiveness across various operational functions, especially cyber security. Typically, detection and response capabilities are the focus, but becoming more proactive to improve (...)

With economic uncertainty and an evolving threat landscape, it’s more important than ever for organizations to prove their effectiveness across various operational functions, especially cyber security. Typically, detection and response capabilities are the focus, but becoming more proactive to improve (...)

The new E3000 Series router, part of Cradlepoint’s Enterprise Branch NetCloud Service, is the industry’s first enterprise-class router optimized for 5G connectivity. The E3000 makes it easy for enterprise customers to embrace the simplicity, reliability, and freedom of a wireless WAN while (...)

The very nature of how software applications are built today has changed from stem to stern, with public cloud at the foundation of this shift. Companies that have successfully ‘digitally transformed’ are thriving, while laggards continue to languish. While digital (...)

The very nature of how software applications are built today has changed from stem to stern, with public cloud at the foundation of this shift. Companies that have successfully ‘digitally transformed’ are thriving, while laggards continue to languish. While digital (...)

The T11 specification for NVMe over Fibre Channel (FC-NVMe) was completed in 2018, since that time, the FCIA has held numerous plugfest events and products have been shipping for a few years. So where are we today with NVMe (...)

The T11 specification for NVMe over Fibre Channel (FC-NVMe) was completed in 2018, since that time, the FCIA has held numerous plugfest events and products have been shipping for a few years. So where are we today with NVMe (...)

The T11 specification for NVMe over Fibre Channel (FC-NVMe) was completed in 2018, since that time, the FCIA has held numerous plugfest events and products have been shipping for a few years. So where are we today with NVMe (...)

Modern AWS Security Best Practices
With Sisense, Orca Security, and Special Guest Sounil Yu, Former Chief Security Scientist, Bank of America
We’ll start off with Sounil Yu, the former Chief Security Scientist at Bank of America, who will explain how to use (...)

Apache Hive is a powerful tool frequently used to analyze data while handling ad-hoc queries and regular ETL workloads. Despite being one of the more mature solutions in the Hadoop ecosystem, developers, data scientists and IT operators are still unable (...)

DX NetOps 20.2 is continuing to evolve to meet the challenges of today’s modern, complex network architectures to better enable you to quickly pinpoint and triage any performance issues. Join us on June 9, 2020 at 1pm EST as we (...)

DX NetOps is continuing to evolve to meet the challenges of today’s modern, complex network architectures to better enable you to quickly pinpoint and triage any performance issues. Join us on June 9, 2020 at 1pm EST as we showcase (...)

Dr. Helen Papagiannis has been working with AR for a decade as a researcher, designer, and technology evangelist. In her cutting-edge talks, Papagiannis takes audiences through the present and future realities that AR both invents and manifests.
AR is not a (...)

IoT initiatives are exploding. Nemertes has found that companies with successful IoT initiatives are increasing both the number of projects and the device count, with growth that ranges up to 100%+ year over year.
Scaling these initiatives requires scaling not only (...)

IoT initiatives are exploding. Nemertes has found that companies with successful IoT initiatives are increasing both the number of projects and the device count, with growth that ranges up to 100%+ year over year.
Scaling these initiatives requires scaling not only (...)

IoT initiatives are exploding. Nemertes has found that companies with successful IoT initiatives are increasing both the number of projects and the device count, with growth that ranges up to 100%+ year over year.
Scaling these initiatives requires scaling not only (...)

For the last several years, organizations around the world have been moving applications and services to the cloud at an increasing pace. Despite this investment, many organizations fail to fully understand the security controls they have at their disposal and (...)

For the last several years, organizations around the world have been moving applications and services to the cloud at an increasing pace. Despite this investment, many organizations fail to fully understand the security controls they have at their disposal and (...)

The financial services industry is subject to enormous risk: it faces the highest rates of attack of any vertical market, it is the source of one-third of all data breaches, and it is vulnerable due to both the negligence and (...)

Microsoft Office 365 offers customers a wide range of products and services with one monthly subscription fee. However their one size fits all approach to digital compliance and archiving might not be suitable for everyone.
Learn how Micro Focus Retain (...)

Microsoft Office 365 offers customers a wide range of products and services with one monthly subscription fee. However their one size fits all approach to digital compliance and archiving might not be suitable for everyone.
Learn how Micro Focus Retain (...)

While every organization has different data needs, disparate data sources, unreliable data pipelines, and a lack of knowledge about your data are common problems business leaders face. With the right data strategy, you can unblock the barriers to making data-driven (...)

Nir Eyal writes, consults, and teaches about the intersection of psychology, technology, and business. The M.I.T. Technology Review dubbed Nir, “The Prophet of Habit-Forming Technology.”
Nir founded two tech companies since 2003 and has taught at the Stanford Graduate School of Business (...)

As the world is moving towards a ‘new normal’ set by COVID-19, many of the contact centers have now moved to a remote model. While for some companies, remote operations have always been a part of their working model, for (...)

Many organizations define cyber defense strategies based on fears or fines: decisions makers are often influenced by the latest news headline or the next audit.
Today, threat intelligence content levels have evolved to reach new readers or enable innovative use cases. (...)

Many organizations define cyber defense strategies based on fears or fines: decisions makers are often influenced by the latest news headline or the next audit.
Today, threat intelligence content levels have evolved to reach new readers or enable innovative use cases. (...)

Many organizations define cyber defense strategies based on fears or fines: decisions makers are often influenced by the latest news headline or the next audit.
Today, threat intelligence content levels have evolved to reach new readers or enable innovative use cases. (...)

Many organizations define cyber defense strategies based on fears or fines: decisions makers are often influenced by the latest news headline or the next audit.
Today, threat intelligence content levels have evolved to reach new readers or enable innovative use cases. (...)

The Security Operation Center or SOC has historically played the important role as the ‘command and control’ hub for an organization’s cybersecurity efforts. However, the reactive SOC of yester-year cannot keep up with today’s advanced adversaries and is failing to (...)

Stacey Higginbotham has been covering technology for major publications for 20 years, and currently covers the industrial, enterprise, and consumer internet of things.
She is co-host of the Internet of Things Podcast and publisher of the Stacey on IoT newsletter analyzing (...)

Ransomware is one of the most active and profound cyber threats facing organizations today. Years after Wannacry attacks shuttered businesses across the globe, stealthy ransomware infections continuously dominate headlines and board discussions. Attackers have developed advanced techniques that now require (...)

Ransomware is one of the most active and profound cyber threats facing organizations today. Years after Wannacry attacks shuttered businesses across the globe, stealthy ransomware infections continuously dominate headlines and board discussions. Attackers have developed advanced techniques that now require (...)

Blake Moret is Chairman and CEO of Rockwell Automation, the world’s largest company singularly focused on industrial automation and information. As CEO, Blake is dedicated to delivering the company’s strategy to bring the Connected Enterprise to life.
Under his leadership, Rockwell (...)

An intelligence-led security posture and program recognizes that cyber threat intelligence has the potential to help keep organizations ahead of adversaries. The challenge is how to effectively and repeatedly make proper use of the intelligence that organizations collect and consume. (...)

An intelligence-led security posture and program recognizes that cyber threat intelligence has the potential to help keep organizations ahead of adversaries. The challenge is how to effectively and repeatedly make proper use of the intelligence that organizations collect and consume. (...)

An intelligence-led security posture and program recognizes that cyber threat intelligence has the potential to help keep organizations ahead of adversaries. The challenge is how to effectively and repeatedly make proper use of the intelligence that organizations collect and consume. (...)

Elaborating on his article, "Data Governance and The Art of the Fugue," Randy will guide the audience through a layperson's explanation of what a fugue is, using J.S. Bach's The Art of the Fugue as an example, and draw parallels (...)

Ransomware threat actors are upping their game along with their ransom demands, which are climbing into millions of dollars. Large organizations with significant security controls in place are still falling prey to the attackers' tactics. This session examines how ransomware (...)

Ransomware threat actors are upping their game along with their ransom demands, which are climbing into millions of dollars. Large organizations with significant security controls in place are still falling prey to the attackers' tactics. This session examines how ransomware (...)

The way the world works has changed. While we continue social distancing and working from home, businesses need to transform – quickly, efficiently and in a cost-effective manner.
While teams have begun working remotely at an unprecedented scale, are you (...)

Simulation World is a free online event designed to inspire and educate executives, engineers, R&D and manufacturing professionals about the transformative powers of engineering simulation and Ansys.
Two Days of Powerful Talks | June 10-11, 2020
Engage in a full and exhilarating (...)

Join Jens Monrad, Head of Mandiant Threat Intelligence – EMEA, for ‘Cyber Threat Intelligence as a Business Enabler’.
This session will cover how accurate and relevant Cyber Threat Intelligence can help organisations make smarter decisions around cyber defence, alert & event (...)

Join Jens Monrad, Head of Mandiant Threat Intelligence – EMEA, for ‘Cyber Threat Intelligence as a Business Enabler’.
This session will cover how accurate and relevant Cyber Threat Intelligence can help organisations make smarter decisions around cyber defence, alert & event (...)

Join Jens Monrad, Head of Mandiant Threat Intelligence – EMEA, for ‘Cyber Threat Intelligence as a Business Enabler’.
This session will cover how accurate and relevant Cyber Threat Intelligence can help organisations make smarter decisions around cyber defence, alert & event (...)

Join Jens Monrad, Head of Mandiant Threat Intelligence – EMEA, for ‘Cyber Threat Intelligence as a Business Enabler’.
This session will cover how accurate and relevant Cyber Threat Intelligence can help organisations make smarter decisions around cyber defence, alert & event (...)

Join Jens Monrad, Head of Mandiant Threat Intelligence – EMEA, for ‘Cyber Threat Intelligence as a Business Enabler’.
This session will cover how accurate and relevant Cyber Threat Intelligence can help organisations make smarter decisions around cyber defence, alert & event (...)

To avoid a data breach, your organisation must detect and respond quickly to anomalous activity. The Verizon Data Breach Investigations Report, 2017 states that user-based threats are on the rise:
•69% of organisations report incidents of attempted data theft — by (...)

To avoid a data breach, your organisation must detect and respond quickly to anomalous activity. The Verizon Data Breach Investigations Report, 2017 states that user-based threats are on the rise:
•69% of organisations report incidents of attempted data theft — by (...)

To avoid a data breach, your organisation must detect and respond quickly to anomalous activity. The Verizon Data Breach Investigations Report, 2017 states that user-based threats are on the rise:
•69% of organisations report incidents of attempted data theft — by (...)

Are Microsoft 365 applications like Teams, Outlook and SharePoint rapidly turning into the core of your work? A significant part, if not all, of your productivity, critical communication and data are stored and created in this environment. Losing this data (...)

Built from the ground up with next-generation storage technology to make your business more agile and prepared for change. See how we differ from the competition and view first-hand the simplicity of PowerStore with an interactive Demo.
• NVMe all-flash or Storage (...)

Being historically a manufacturing company, Grundfos aims to bring digital transformation into its core business. This radical move not only bring challenges, but also energizes a wave of exploring/adopting state-of-the-art cloud computing, machine learning and AI technologies that impact different (...)

The MTD is broad enough to cover many angles linked to the mobile risks and the MDM is interesting because there is a misconception from IT people that if you have a MDM solution in place, your safe. We are (...)

The MTD is broad enough to cover many angles linked to the mobile risks and the MDM is interesting because there is a misconception from IT people that if you have a MDM solution in place, your safe. We are (...)

The Framework for Threat Intelligence-based Ethical Red Teaming (TIBER-EU) enables European and national authorities to work with financial infrastructures and institutions to put in place a programme to test and improve their resilience against sophisticated cyber-attacks. Among the core objectives (...)

The Framework for Threat Intelligence-based Ethical Red Teaming (TIBER-EU) enables European and national authorities to work with financial infrastructures and institutions to put in place a programme to test and improve their resilience against sophisticated cyber-attacks. Among the core objectives (...)

The Framework for Threat Intelligence-based Ethical Red Teaming (TIBER-EU) enables European and national authorities to work with financial infrastructures and institutions to put in place a programme to test and improve their resilience against sophisticated cyber-attacks. Among the core objectives (...)

The Framework for Threat Intelligence-based Ethical Red Teaming (TIBER-EU) enables European and national authorities to work with financial infrastructures and institutions to put in place a programme to test and improve their resilience against sophisticated cyber-attacks. Among the core objectives (...)

The Framework for Threat Intelligence-based Ethical Red Teaming (TIBER-EU) enables European and national authorities to work with financial infrastructures and institutions to put in place a programme to test and improve their resilience against sophisticated cyber-attacks. Among the core objectives (...)

The Framework for Threat Intelligence-based Ethical Red Teaming (TIBER-EU) enables European and national authorities to work with financial infrastructures and institutions to put in place a programme to test and improve their resilience against sophisticated cyber-attacks. Among the core objectives (...)

The Framework for Threat Intelligence-based Ethical Red Teaming (TIBER-EU) enables European and national authorities to work with financial infrastructures and institutions to put in place a programme to test and improve their resilience against sophisticated cyber-attacks. Among the core objectives (...)

Dell Technologies appreciates the impacts that Higher Education institutions are currently experiencing during this challenging time and the concerns around loss of income from international students, the shift to remote digital learning, the need for remote engagement with prospective students (...)

Dell Technologies appreciates the impacts that Higher Education institutions are currently experiencing during this challenging time and the concerns around loss of income from international students, the shift to remote digital learning, the need for remote engagement with prospective students (...)

As global concern about the COVID-19 outbreak continues, businesses around the world are under tremendous additional pressure to adapt to a quickly shifting situation. Watch our on-demand webinar where you’ll hear from leading Finance executives and advisors about how they’re (...)

As global concern about the COVID-19 outbreak continues, businesses around the world are under tremendous additional pressure to adapt to a quickly shifting situation. Watch our on-demand webinar where you’ll hear from leading Finance executives and advisors about how they’re (...)

As global concern about the COVID-19 outbreak continues, businesses around the world are under tremendous additional pressure to adapt to a quickly shifting situation. Watch our on-demand webinar where you’ll hear from leading Finance executives and advisors about how they’re (...)

Address complexity and stay ahead of the competition by delivering first-time quality tooling
In this webinar, Michelle Boucher from Tech-Clarity, an independent research firm, shares the conclusions from a research study on the challenges, capabilities, and projections of companies in the (...)

Protecting corporate networks is challenging. Large organizations are attacked daily and more often than not, the speed at which you find threats entering the network is vital. Network Intrusion Detection Systems (NIDS) are key components that help protect the network (...)

Protecting corporate networks is challenging. Large organizations are attacked daily and more often than not, the speed at which you find threats entering the network is vital. Network Intrusion Detection Systems (NIDS) are key components that help protect the network (...)

Join Intel & Bright Computing to dive into how to install an Intel HPC Select Solutions for HPC clustered environment using Bright Cluster Manger. Covering what benefits are built into the installation process including support for the Intel HPC Platform (...)

NaaS presents a new emerging opportunity for communication service providers (CoSP) to revolutionize their network and cloud service offerings for the crucial enterprise segment, providing enhanced choice, agility and control to match ever-changing business needs
Join this webinar to for insights (...)

Join the conversation as industry experts discuss how businesses are taking advantage of predictive analytics technology to gain a competitive edge in the marketplace.
You'll discover:
- Use cases that show how AI and machine learning are helping companies be more proactive (...)

Learn more about the use of DDS in Maintenance Sensor Networks. Complex sensor networks are often required for Maintenance (predictive and preventive) in smart manufacturing, oil & gas, smart power grids & distribution, healthcare, cold storage, waste management and more.
These (...)

Election security is a top concern for national and local governments across the world. With real-world experience from the frontlines of cyber attacks, our experts share hard-won guidance on strategies to reinforce elections infrastructure against malicious cyber activity.
Join us to (...)

Election security is a top concern for national and local governments across the world. With real-world experience from the frontlines of cyber attacks, our experts share hard-won guidance on strategies to reinforce elections infrastructure against malicious cyber activity.
Join us to (...)

Election security is a top concern for national and local governments across the world. With real-world experience from the frontlines of cyber attacks, our experts share hard-won guidance on strategies to reinforce elections infrastructure against malicious cyber activity.
Join us to (...)

Recent events have taught us that infrastructure stability is more important than ever as business applications and continuity is only as reliable as the underlying infrastructure. It keeps businesses running, people connected, and customers engaged. In uncertain times, (...)

Achieving compliance across a wealth of new international data privacy laws and regulations is a growing challenge, with many organisations struggling to keep pace. Significant numbers of organisations still have either not yet invested in data discovery and classification in their (...)

Achieving compliance across a wealth of new international data privacy laws and regulations is a growing challenge, with many organisations struggling to keep pace. Significant numbers of organisations still have either not yet invested in data discovery and classification in their (...)

In the security community, stories are how we warn, educate and inform one another, if only so others will learn from and avoid the same mistakes. Because ransomware has seen such a resurgence in recent years, almost everyone has a (...)

In the security community, stories are how we warn, educate and inform one another, if only so others will learn from and avoid the same mistakes. Because ransomware has seen such a resurgence in recent years, almost everyone has a (...)

Data Science is having an increasing impact in sports. TIBCO actively supports teams such as Mercedes-AMG Petronas Formula One, TIBCO-Silicon Valley Women’s Cycling, and the NFL.
In this webinar, we will discuss the impact analytics and data science is having (...)

Data Science is having an increasing impact in sports. TIBCO actively supports teams such as Mercedes-AMG Petronas Formula One, TIBCO-Silicon Valley Women’s Cycling, and the NFL.
In this webinar, we will discuss the impact analytics and data science is having (...)

Third Party Applications or Commercial Off The Shelf (COTS) Applications are mission critical, often consume expensive resources, and require manual maintenance. Can we take advantage of the elasticity, resilience, enhanced security, shortened software development cycles of cloud-native environments for these (...)

In order to effectively use cryptography to protect information, one has to ensure that the associated cryptographic keys are also protected. Attention must be paid to how cryptographic keys are generated, distributed, used, stored, replaced and destroyed in order (...)

In order to effectively use cryptography to protect information, one has to ensure that the associated cryptographic keys are also protected. Attention must be paid to how cryptographic keys are generated, distributed, used, stored, replaced and destroyed in order (...)

In order to effectively use cryptography to protect information, one has to ensure that the associated cryptographic keys are also protected. Attention must be paid to how cryptographic keys are generated, distributed, used, stored, replaced and destroyed in order (...)

In order to effectively use cryptography to protect information, one has to ensure that the associated cryptographic keys are also protected. Attention must be paid to how cryptographic keys are generated, distributed, used, stored, replaced and destroyed in order (...)

What are the best practices for building a people-centric cybersecurity strategy and where should your organization start? Proofpoint provides holistic solutions that address today’s threat environment. Our solutions grow with organizations as they continue to elevate their security strategies from (...)

What is a "virtual event" and how should marketers be thinking about them? Dennis Shiao is a marketing consultant who's helped plan and execute virtual events for HP, Oracle, Cisco and other technology companies.
In this webinar, Dennis will break (...)

Adoption of cloud computing, an increasingly remote workforce and more reliance on mobile devices to access enterprise applications has radically changed how technology is deployed and used. Organizations need to protect their digital assets with strategies that evolve to support (...)

Adoption of cloud computing, an increasingly remote workforce and more reliance on mobile devices to access enterprise applications has radically changed how technology is deployed and used. Organizations need to protect their digital assets with strategies that evolve to support (...)

The democratization of clinical trials is disruptive and that’s a good thing. Join this talk with MDGroup's Chief Data Scientist Richard Maguire as he discusses:
Managing the Big Data Wave
- Performant Infrastructure not only to manage the data size and types, (...)

Adopting a hybrid cloud strategy is a journey, not a destination. When you consider using a public cloud environment for some or all of your applications, you’re faced with a number of choices and approaches. When considering a hybrid cloud (...)

Adopting a hybrid cloud strategy is a journey, not a destination. When you consider using a public cloud environment for some or all of your applications, you’re faced with a number of choices and approaches. When considering a hybrid cloud (...)

Adopting a hybrid cloud strategy is a journey, not a destination. When you consider using a public cloud environment for some or all of your applications, you’re faced with a number of choices and approaches. When considering a hybrid cloud (...)

In the past few years, Insider Threat has evolved in several aspects from how sensitive data leaves the organization to ways in which privilege access gets misused, creating risks for organizations to mitigate. The proliferation of cloud applications had made (...)

In the past few years, Insider Threat has evolved in several aspects from how sensitive data leaves the organization to ways in which privilege access gets misused, creating risks for organizations to mitigate. The proliferation of cloud applications had made (...)

To prevent outages of business-critical digital services, organizations often invest heavily on IT Ops tools and staff. An AIOps platform can help organizations minimize that spend and boost service assurance, resulting in broad business benefits.
Join this fireside chat with Moogsoft (...)

Old world approaches to modern cloud analytics simply won't cut it. Gone are lengthy structured processes, ETL, and complex rigid schemas. In are agility, self-service, and ad-hoc discovery. And with the market for cloud analytics skyrocketing to $37.8 billion by (...)

Today’s security and IT teams are struggling to keep up. The digital landscape is constantly changing and between disparate, unintegrated systems and repetitive, manual processes, security teams are having a difficult time getting ahead. There are too many alerts, not (...)

Most C-suite leaders believe their investment decisions in security risk management is not keeping up with the new and heightened levels of cyber risks. This is often due to their use of the decade old, top-down approach in leveraging risk (...)

Most C-suite leaders believe their investment decisions in security risk management is not keeping up with the new and heightened levels of cyber risks. This is often due to their use of the decade old, top-down approach in leveraging risk (...)

Most C-suite leaders believe their investment decisions in security risk management is not keeping up with the new and heightened levels of cyber risks. This is often due to their use of the decade old, top-down approach in leveraging risk (...)

Marketing leaders expect their decisions to be driven by data. To do this, organizations must centralize data in one place—in a format that’s accessible and actionable across the entire business. But bringing data together is only the first step.
Subaru of (...)

Industrial manufacturers, regardless of company sizes, are facing growing challenges on their ability to create increasingly complex products with the desired quality and at the speed of the market demand. This requires them to find new ways to deal with (...)

When optimizing security defenses, organizations need to know as much as possible about today’s attacks and threat actors to protect critical systems, data and users against likely attack scenarios. Cyber threat intelligence can give organizations rich context on the (...)

When optimizing security defenses, organizations need to know as much as possible about today’s attacks and threat actors to protect critical systems, data and users against likely attack scenarios. Cyber threat intelligence can give organizations rich context on the (...)

When optimizing security defenses, organizations need to know as much as possible about today’s attacks and threat actors to protect critical systems, data and users against likely attack scenarios. Cyber threat intelligence can give organizations rich context on the (...)

When optimizing security defenses, organizations need to know as much as possible about today’s attacks and threat actors to protect critical systems, data and users against likely attack scenarios. Cyber threat intelligence can give organizations rich context on the (...)

Cyber crime has redefined security operations for governments and the private sector. A continually evolving threat environment means cyber crime is growing in both scale and diversity. Public and private organizations must shed any pre-disposed focus on cyber espionage to (...)

Cyber crime has redefined security operations for governments and the private sector. A continually evolving threat environment means cyber crime is growing in both scale and diversity. Public and private organizations must shed any pre-disposed focus on cyber espionage to (...)

Cyber crime has redefined security operations for governments and the private sector. A continually evolving threat environment means cyber crime is growing in both scale and diversity. Public and private organizations must shed any pre-disposed focus on cyber espionage to (...)

Articulating the return on investment (ROI) of your security program can be a challenge - especially when you’re communicating to stakeholders outside of your core team. While security professionals might know “good” when they see it, understanding the ROI of (...)

When Mandiant respond to a breach they need equally elite weapons to facilitate their response. This war story will look at how Mandiant Incident Responders fought off APT38 using some of the more sophisticated functions of FireEye Endpoint Security.

When Mandiant respond to a breach they need equally elite weapons to facilitate their response. This war story will look at how Mandiant Incident Responders fought off APT38 using some of the more sophisticated functions of FireEye Endpoint Security.

When Mandiant respond to a breach they need equally elite weapons to facilitate their response. This war story will look at how Mandiant Incident Responders fought off APT38 using some of the more sophisticated functions of FireEye Endpoint Security.

When Mandiant respond to a breach they need equally elite weapons to facilitate their response. This war story will look at how Mandiant Incident Responders fought off APT38 using some of the more sophisticated functions of FireEye Endpoint Security.

Red team assessments help organizations evaluate their readiness to defend against advanced attacks. They identify relevant weaknesses in current detection and response procedures that advanced threat actors routinely exploit to avoid detection, break in and complete their attack objectives.
This (...)

Red team assessments help organizations evaluate their readiness to defend against advanced attacks. They identify relevant weaknesses in current detection and response procedures that advanced threat actors routinely exploit to avoid detection, break in and complete their attack objectives.
This (...)

Simulation World is a free online event designed to inspire and educate executives, engineers, R&D and manufacturing professionals about the transformative powers of engineering simulation and Ansys.
Two Days of Powerful Talks | June 10-11, 2020
Engage in a full and exhilarating (...)

The corona virus pandemic has dramatically impacted the retail sector over the past months. Shopping preferences have shifted further from in-store to online and click-and-collect, while in-store experiences are heavily influenced by a store's ability to ensure social distancing can (...)

Predict components performance during integration for better design
Automotive radar sensor and antenna system design is a cornerstone of autonomous driving. Yet, the integration of these systems poses a range of challenges for the engineer. Will the antenna properly work once (...)

In this session hear from a leading consultant who constantly interacts with customers dealing with issues from technical response to crisis management. FireEye investigates some of the most complex breaches: learn from a front-line specialist about both existing and emerging (...)

In this session hear from a leading consultant who constantly interacts with customers dealing with issues from technical response to crisis management. FireEye investigates some of the most complex breaches: learn from a front-line specialist about both existing and emerging (...)

In this session hear from a leading consultant who constantly interacts with customers dealing with issues from technical response to crisis management. FireEye investigates some of the most complex breaches: learn from a front-line specialist about both existing and emerging (...)

Data Science has reached a point of maturity in large organizations. Having proven its value on fascinating niche use cases, it is now on every executive’s mind and ready to radically transform business-as-usual processes. But in order to pull off (...)

Data Science has reached a point of maturity in large organizations. Having proven its value on fascinating niche use cases, it is now on every executive’s mind and ready to radically transform business-as-usual processes. But in order to pull off (...)

In this talk, you will learn different types of architectures for multiples use cases, and the main tools to build and develop your analytics apps.
Architectures for:
- Elasticity
- Predictive inventory
- Recommendation Systems
And the best tools to deploy them fast, accurate (...)

The ability to accurately and rapidly create piping and instrumentation diagrams (P&ID) is crucial for meeting company and international quality standards.
In this ever-changing environment, companies need complete traceability when moving 2D P&ID design into a comprehensive 3D model of a (...)

Today’s enterprises are embracing a deep and drastic transformation and modernization to deliver their customers 100% business uptime while being nimble, simple and agile from an operational standpoint. While micro-service architectures, hyper-automation, and cloud are the de-facto agreed technologies driving (...)

Today’s enterprises are embracing a deep and drastic transformation and modernization to deliver their customers 100% business uptime while being nimble, simple and agile from an operational standpoint. While micro-service architectures, hyper-automation, and cloud are the de-facto agreed technologies driving (...)

Qualys Technical Series is a new, live online training series taking place on the second Thursday of the month. Each month, we’ll discuss a new topic starting with a general introduction walkthrough (40 min) followed by a live Q&A (20 (...)

Who is in the BrightTALK Fintech community, what topics are of most importance to them, and what type of content do they prefer?
Join this webinar to learn:
- How the community has grown and evolved
- What topics are trending and which (...)

Who is in the BrightTALK Fintech community, what topics are of most importance to them, and what type of content do they prefer?
Join this webinar to learn:
- How the community has grown and evolved
- What topics are trending and which (...)

Who is in the BrightTALK Fintech community, what topics are of most importance to them, and what type of content do they prefer?
Join this webinar to learn:
- How the community has grown and evolved
- What topics are trending and which (...)

In an increasingly digitally connected world with abundant data sources, manufacturers and logistics companies need even more efficient ways to make effective supply chain decisions in real-time.
How do you overcome the delays in analyzing real-time data? How can you translate (...)

Teams user adoption is currently exploding. But more users working in Teams means more people spinning up Teams, channels, adding guests, posting documents, etc., than ever before. This can cause huge issues when it comes to group sprawl.

The International Cable Protection Committee (ICPC) in April, published a ‘call to action’ for governments and industry to facilitate and expedite the deployment, operation, and repair of subsea cables during the Covid-19 pandemic.
Capacity speaks to industry experts and operators (...)

The International Cable Protection Committee (ICPC) in April, published a ‘call to action’ for governments and industry to facilitate and expedite the deployment, operation, and repair of subsea cables during the Covid-19 pandemic.
Capacity speaks to industry experts and operators (...)

The International Cable Protection Committee (ICPC) in April, published a ‘call to action’ for governments and industry to facilitate and expedite the deployment, operation, and repair of subsea cables during the Covid-19 pandemic.
Capacity speaks to industry experts and operators (...)

The International Cable Protection Committee (ICPC) in April, published a ‘call to action’ for governments and industry to facilitate and expedite the deployment, operation, and repair of subsea cables during the Covid-19 pandemic.
Capacity speaks to industry experts and operators (...)

Do you still print work orders and instructions to the factory floor? Is your manufacturing process a black box and your ERP only updated when finished goods are received? Watch our webinar and we will show you the latest of (...)

The current pandemic is creating unique challenges for financial institution to manage risk and capital requirements. Banks are being challenged by everything from moving to remote working environments for its contact center professionals to a shift in payments from physical (...)

A quick review of the Zero Trust landscape reveals a lack of focus on what organizations need to do to maintain user engagement while they upgrade their security model. The security challenge is to protect digital resources that span across (...)

A quick review of the Zero Trust landscape reveals a lack of focus on what organizations need to do to maintain user engagement while they upgrade their security model. The security challenge is to protect digital resources that span across (...)

With the advent of automation, iRules have become an artifact of the past. Especially when the most commonly deployed F5 iRules such as HTTP redirects, content switching, or logging, require custom scripting. It can be a huge pain for an (...)

With the advent of automation, iRules have become an artifact of the past. Especially when the most commonly deployed F5 iRules such as HTTP redirects, content switching, or logging, require custom scripting. It can be a huge pain for an (...)

In this case study webinar for academics, we will explore high-temperature materials, in particular nickel- and cobalt-based superalloys and technical ceramics, for aerospace and automotive applications.
Inspired by an industrial research conference presentation, we have studied the suitability of ceramic turbine (...)

As organizations bear witness to the well-chronicled successes of API economy juggernauts like Google, Amazon, Stripe and Twilio the pressure on business and IT to seize the opportunity and deliver measurable business outcomes mounts. To build API products and participate (...)

What’s the most pressing issue in software security from the last 20 years? We think it’s how to evolve your software security initiative (SSI) to support a modern DevOps practice and CI/CD pipeline while still meeting your security objectives. In (...)

What’s the most pressing issue in software security from the last 20 years? We think it’s how to evolve your software security initiative (SSI) to support a modern DevOps practice and CI/CD pipeline while still meeting your security objectives. In (...)

Automating privacy risk minimization strategies can enable financial institutions to realize the benefits of accelerating analytics usage and keeping costs in check through services from cloud providers like Amazon Web Service.
Join us for an in-depth look at how (...)

In this webinar, we'll discuss Numba's extensibility using Intel Scalable Dataframe Compiler project as a case study. Numba is a just-in-time compiler for Python that is designed for scientific, engineering, and data science applications. We will demonstrate the code autovectorization (...)

Stay up-to-date on the latest tools and best practices that industry experts recommend in order to get the most value out of your advanced analytics and data science strategy.
You'll come away with:
- A better knowledge of the technology on offer (...)

Stay up-to-date on the latest tools and best practices that industry experts recommend in order to get the most value out of your advanced analytics and data science strategy.
You'll come away with:
- A better knowledge of the technology on offer (...)

Stay up-to-date on the latest tools and best practices that industry experts recommend in order to get the most value out of your advanced analytics and data science strategy.
You'll come away with:
- A better knowledge of the technology on offer (...)

This is the world's largest virtual event for construction and will welcome 100+ speakers and 1000s of digital construction professionals from across the globe.
There is no cost to join and all sessions are CPD accredited. Online presentations and panel discussions (...)

Security teams are increasingly finding it challenging to keep up with the changing risks, compliance requirements, tools, and architectural changes introduced by new technologies. As traditional infrastructure evolves to a mix of bare metal, virtual, cloud, and container environments, how (...)

Duo has been part of the passwordless authentication conversation from the start, as early adopters of the WebAuthn protocol and one of the first strategic partners of the FIDO Alliance. Advances like WebAuthn enable faster, easier, and more secure authentications, (...)

As organizations’ business patterns evolve in the face of remote working, emails continue to constitute the connective tissue of companies globally. Over the past few months, cyber-criminals have consistently exploited this reliance on the inbox in a number of different (...)

As organizations’ business patterns evolve in the face of remote working, emails continue to constitute the connective tissue of companies globally. Over the past few months, cyber-criminals have consistently exploited this reliance on the inbox in a number of different (...)

A few years ago, in the wake of the annexation of Crimea by the Russian Federation, the world became aware of Russian cyber attacker capabilities. The story of this first real instance of cyber war is captured in WIRED (...)

A few years ago, in the wake of the annexation of Crimea by the Russian Federation, the world became aware of Russian cyber attacker capabilities. The story of this first real instance of cyber war is captured in WIRED (...)

A few years ago, in the wake of the annexation of Crimea by the Russian Federation, the world became aware of Russian cyber attacker capabilities. The story of this first real instance of cyber war is captured in WIRED (...)

A few years ago, in the wake of the annexation of Crimea by the Russian Federation, the world became aware of Russian cyber attacker capabilities. The story of this first real instance of cyber war is captured in WIRED (...)

As cyber threats become faster and more sophisticated in the financial services sector, data breaches cost reached an average of $225 for North America per compromised record and the total average organizational cost of data breach hit a new high (...)

As data growth in enterprises continues to sky rocket, datacenter cloud scalability whether on premises, in hybrid cloud or in multicloud deployments is key for businesses. So, what are enterprise IT organizations supposed to do, given that 'run anything anywhere' (...)

As data growth in enterprises continues to sky rocket, datacenter cloud scalability whether on premises, in hybrid cloud or in multicloud deployments is key for businesses. So, what are enterprise IT organizations supposed to do, given that 'run anything anywhere' (...)

As data growth in enterprises continues to sky rocket, datacenter cloud scalability whether on premises, in hybrid cloud or in multicloud deployments is key for businesses. So, what are enterprise IT organizations supposed to do, given that 'run anything anywhere' (...)

As data growth in enterprises continues to sky rocket, datacenter cloud scalability whether on premises, in hybrid cloud or in multicloud deployments is key for businesses. So, what are enterprise IT organizations supposed to do, given that 'run anything anywhere' (...)

As data growth in enterprises continues to skyrocket, datacenter cloud scalability, whether on premises, in hybrid cloud or in multicloud deployments, is key for businesses. So, what are enterprise IT organizations supposed to do, given that 'run anything anywhere' is (...)

As data growth in enterprises continues to skyrocket, datacenter cloud scalability, whether on premises, in hybrid cloud or in multicloud deployments, is key for businesses. So, what are enterprise IT organizations supposed to do, given that 'run anything anywhere' is (...)

Cloud Architecture Summit is a multi-vendor online event to feature technologies and Best Practices to design and deliver agile and end-to-end integration for the digital enterprise.
Speakers will focus on use cases across on-premises, cloud, iPaaS, PaaS, SaaS and trusted APIs.
- (...)

Today is the day you outplay cyber attackers. They can deliver easy to execute, threats with immediate impact through an as-a-service model. To beat them, CISOs must assemble skilled cyber security staff, threat intelligence and technology into an innovative managed (...)

Today is the day you outplay cyber attackers. They can deliver easy to execute, threats with immediate impact through an as-a-service model. To beat them, CISOs must assemble skilled cyber security staff, threat intelligence and technology into an innovative managed (...)

Quick: what’s the first thought that comes to mind when you read SNIA’s definition of archive: a “collection of data objects…in a storage system whose primary purpose is the long-term preservation and retention of that data”? Why, right? The answer (...)

Quick: what’s the first thought that comes to mind when you read SNIA’s definition of archive: a “collection of data objects…in a storage system whose primary purpose is the long-term preservation and retention of that data”? Why, right? The answer (...)

With businesses fighting back, you have fewer resources to get the work done – not to mention all the new digital initiatives spawned from the pandemic. Ruthless prioritization is easier said than done when you’re not sure about objectives and (...)

Now part of F5, Shape Security offers the leading solution for the world’s largest companies to prevent fraud and financial abuse. With an advanced platform that utilizes artificial intelligence and machine learning—supported by powerful cloud-based analytics—Shape protects against attacks that (...)

Recent public breaches highlight the importance of a security strategy that extends beyond the network perimeter. As organizations adopt containers, an automated approach to security, testing, and application development is needed to increase productivity and reduce risk.
In this session, (...)

The threats to financial data are continuously evolving and newly-introduced compliance standards require more stringent enforcement. Now firms are challenged to adapt their security and compliance strategy to the new reality - virtual workforces, remote training, and testing for new (...)

A current issue organizations face is that there’s a proliferation of data analytics technologies. The new normal is to have a multi-technology approach to BI and analytics. The cause and effect of this is that employees are faced with getting (...)

Why is a data-driven strategy essential for the success of your business? Data Science has come so far recently, but why? What industry trends are impacting the Data Science and AI industries? David explores common language to demystify (...)

Why is a data-driven strategy essential for the success of your business? Data Science has come so far recently, but why? What industry trends are impacting the Data Science and AI industries? David explores common language to demystify (...)

Why is a data-driven strategy essential for the success of your business? Data Science has come so far recently, but why? What industry trends are impacting the Data Science and AI industries? David explores common language to demystify (...)

The Security Operation Center or SOC has historically played the important role as the ‘command and control’ hub for an organization’s cybersecurity efforts. However, the reactive SOC of yester-year cannot keep up with today’s advanced adversaries and is failing to (...)

The Security Operation Center or SOC has historically played the important role as the ‘command and control’ hub for an organization’s cybersecurity efforts. However, the reactive SOC of yester-year cannot keep up with today’s advanced adversaries and is failing to (...)

Economic changes put new pressures on cyber risk and threat management spending. All the while, attackers maintain or even increase their activities. So how to adapt to this new dilemma and communicate the value of threat intelligence to all stakeholders? (...)

Economic changes put new pressures on cyber risk and threat management spending. All the while, attackers maintain or even increase their activities. So how to adapt to this new dilemma and communicate the value of threat intelligence to all stakeholders? (...)

Economic changes put new pressures on cyber risk and threat management spending. All the while, attackers maintain or even increase their activities. So how to adapt to this new dilemma and communicate the value of threat intelligence to all stakeholders? (...)

Cloud usage in the public sector has evolved significantly, and so has its security. Still, federal agencies continue to face many new challenges, such as lack of continuous visibility, inability to detect misconfigurations and credential misuse, lack of detection capabilities (...)

Cloud usage in the public sector has evolved significantly, and so has its security. Still, federal agencies continue to face many new challenges, such as lack of continuous visibility, inability to detect misconfigurations and credential misuse, lack of detection capabilities (...)

Security assumptions do not equal security effectiveness. With increasing pressure on boards of directors and CEOs to provide evidence that business assets are protected from the fallout of a potential breach, the need to justify security investments is now a (...)

Security assumptions do not equal security effectiveness. With increasing pressure on boards of directors and CEOs to provide evidence that business assets are protected from the fallout of a potential breach, the need to justify security investments is now a (...)

Security assumptions do not equal security effectiveness. With increasing pressure on boards of directors and CEOs to provide evidence that business assets are protected from the fallout of a potential breach, the need to justify security investments is now a (...)

Security assumptions do not equal security effectiveness. With increasing pressure on boards of directors and CEOs to provide evidence that business assets are protected from the fallout of a potential breach, the need to justify security investments is now a (...)

FE simulation is widely used by engineers to gain insight into the structural, vibration, impact and thermal performance of components, sub-assemblies and systems. In fact, the availability of FE simulation tools embedded within CAD software has driven this adoption and (...)

Nuix and Microsoft Teams – How the world’s most advanced processing engine is leveraging the MS Graph API. A demonstration of possibly the most important connector in Nuix history.
Please join Nuix for a discussion and demonstration of the Microsoft (...)

Protecting personal information is the new normal, and personal data privacy will be the most prominent issue affecting how businesses gather, store, process, and disclose data in 2019. Gartner includes data ethics and privacy on their list of the top (...)

The impact of cyberattacks on organisations is widespread not only from a financial standpoint, but also the operational disruptions, damaged brand reputations, and trust within the organisation. Traditional email security solutions aren’t enough to protect businesses anymore. Processes need to (...)

Organizations have been managing security based on assumptions, hopes and best guesses for decades. We assume our technology will detect, block and send alerts, we hope our incident response techniques will be efficient and effective when under assault, and we (...)

When it comes to dealing with cyberattacks, 61% of IT professionals are not satisfied with the de facto cybersecurity protection method of after-the-fact investigations. Does this frustration sound familiar?
The top three IT pain points have not been alleviated with this (...)

A business is made up of people, work processes and activities, that turn ideas into products and services, delivering business vision and goals. From product design to engineering, from design change to production & service process update, from quality plan (...)

Watch us in this webinar to see how we’re using advanced technologies such as real-time applications and Hikvision thermal camera devices to meet the needs of airports during and after the COVID-19 pandemic.
We will introduce our new application for fever (...)

Design, evaluate and implement appealing interior and exterior sounds for your electric vehicle
Active sound design answers the new acoustic challenges of electric vehicles. As these cars are silent while driving at low speed, governments world-wide are imposing new requirements to (...)

As a CISO, your success rides on your ability to not only protect your organisation from damaging cyberattacks but demonstrate the meaningful business impact and value of your security program to your company’s board.
In this webinar, LogRhythm’s Jonathan Zulberg, (...)

As a cybersecurity professional, your success rides on your ability to not only protect your organisation from damaging cyberattacks but demonstrate the meaningful business impact and value of your security program to your company’s board.
In this webinar, LogRhythm’s Jonathan (...)

As a cybersecurity professional, your success rides on your ability to not only protect your organisation from damaging cyberattacks but demonstrate the meaningful business impact and value of your security program to your company’s board.
In this webinar, LogRhythm’s Jonathan (...)

Discover how to adopt, migrate, scale and secure a multi-cloud infrastructure.
Adoption of multi cloud is soaring. According to ITPro, 76% of the organisations surveyed reported that they were already using from two to 15 hybrid clouds. The transition to (...)

If you can measure it, you can improve it. One major challenge for cyber security teams is establishing a measurable process of validating their security operations to be able to identify gaps in detection coverage and areas of redundancy to (...)

If you can measure it, you can improve it. One major challenge for cyber security teams is establishing a measurable process of validating their security operations to be able to identify gaps in detection coverage and areas of redundancy to (...)

In this webinar Andrew Habibi-Parker, Director of Professional Services for EMEA & APJ and Adam Thompson, Principal Professional Services Consultant will walk you through how a good deployment methodology can pave the way to SIEM success.
Adam & Andrew will (...)

In this webinar Andrew Habibi-Parker, Director of Professional Services for EMEA & APJ and Adam Thompson, Principal Professional Services Consultant will walk you through how a good deployment methodology can pave the way to SIEM success.
Adam & Andrew will (...)

Emerging technologies and related information security trends are key drivers for regulatory change. Yet legislative development continues to lag behind the speed and scale of technological innovation. Even once legislation is enacted, laws differ in their scope of applicability, level (...)

Even in 2020, many organizations overlook the DNS and IP Address Management systems in their cyber security strategy. Many DNS and IPAM systems are afterthoughts in cyber policy and relegated to unmanaged freeware. This approach misses the benefits DNS and (...)

The Covid-19 pandemic has shaken financial institutions’ working practices to the core. Trading volumes have exploded, with some venues recording more than 10X the usual volume of transactions. Volatility has raged, with the benchmark VIX index testing new highs. And (...)

Join our CISO James Carder, for a panel QA session to understand how he manages board-level reporting, exec-level relationships, to achieve a successful cybersecurity culture at LogRhythm. James will be joined by Craig Goodwin, Chief Trust & Risk Officer – (...)

Join our CISO James Carder, for a panel QA session to understand how he manages board-level reporting, exec-level relationships, to achieve a successful cybersecurity culture at LogRhythm. James will be joined by Craig Goodwin, Chief Trust & Risk Officer – (...)

In this webinar, Risto Lehtinen and Antti Karjaluoto of DIMECC will present a new learning concept – Business Model Academy. This learning solution focuses on educating participants about new digital business models and is being implemented with the University of (...)

With some calling multi-cloud ‘the new normal’, more and more companies are moving towards a multi-cloud future. The benefits of a multi-cloud strategy - including reducing vendor lock in and capitalizing on different cloud providers’ strengths - however, take some (...)

This is the world's largest virtual event for construction and will welcome 100+ speakers and 1000s of digital construction professionals from across the globe.
There is no cost to join and all sessions are CPD accredited. Online presentations and panel discussions (...)

The destruction of hard perimeters, the rise of remote work and mobility, and increasingly hybridized infrastructures push identity to the center of enterprise security. Join us as we discuss identity-centric security in a multicloud environment, and concrete steps you can (...)

The Micro Focus Fortify 20.1 release, available now, provides a continued march towards the key strategic initiatives of the product suite with accelerated language support, providing end users with actionable results, continuing to expand our open source solution with Sonatype, (...)

The Micro Focus Fortify 20.1 release, available now, provides a continued march towards the key strategic initiatives of the product suite with accelerated language support, providing end users with actionable results, continuing to expand our open source solution with Sonatype, (...)

With some calling multi-cloud ‘the new normal’, more and more companies are moving towards a multi-cloud future. The benefits of a multi-cloud strategy - including reducing vendor lock in and capitalizing on different cloud providers’ strengths - however, take some (...)

With some calling multi-cloud ‘the new normal’, more and more companies are moving towards a multi-cloud future. The benefits of a multi-cloud strategy - including reducing vendor lock in and capitalizing on different cloud providers’ strengths - however, take some (...)

There is not a single payment flow that has not been affected by what is happening in today's world. As we begin to shift from the unprecedented emergency to the new normal, organizations – from retail to banks – are (...)

Thanks to modern sensors, networked communications, wearable computing today’s warfighter is inundated with data whether piloting a jet, performing Special Operations, or analyzing data from an unmanned aircraft’s ISR payload.
To avoid being overwhelmed, they need the data to be filtered (...)

SOAR has grown exponentially in recent years, both in popularity and demand. An increasing number of enterprises, MSSPs, and security teams have looked for new and innovative solutions to address several pervasive problems, and SOAR quickly became a popular security (...)

There is not a single payment flow that has not been affected by what is happening in today's world. As we begin to shift from the unprecedented emergency to the new normal, organizations – from retail to banks – are (...)

If your team is struggling with resource constraints, you’re probably facing longer-than-ideal response times. This puts your organisation at risk. In this webinar Ed Carolan, Manager, Enterprise Sales Engineering, will outline how you can maximise the benefits of time optimisation (...)

If your team is struggling with resource constraints, you’re probably facing longer-than-ideal response times. This puts your organisation at risk. In this webinar Ed Carolan, Manager, Enterprise Sales Engineering, will outline how you can maximise the benefits of time optimisation (...)

Personalization is a top priority in almost every industry. What if there were a way to personalize the patient experience?
Better patient care starts with better data.
Join us as we discuss how healthcare businesses can deliver personalized care and (...)

DX NetOps is continuing to evolve to meet the challenges of today’s modern, complex network architectures to better enable you to quickly pinpoint and triage any performance issues. Join us on June 16, 2020 at 1pm EST as we take (...)

DX NetOps is continuing to evolve to meet the challenges of today’s modern, complex network architectures to better enable you to quickly pinpoint and triage any performance issues. Join us on June 16, 2020 at 1pm EST as we take (...)

DX NetOps is continuing to evolve to meet the challenges of today’s modern, complex network architectures to better enable you to quickly pinpoint and triage any performance issues. Join us on June 16, 2020 at 1pm EST as we take (...)

Everywhere you turn, someone is talking about MFA. When you strip away the jargon, the platform marketing and ads, what does MFA really offer to the end-user or to a business? As more and more services move into the Cloud, (...)

Everywhere you turn, someone is talking about MFA. When you strip away the jargon, the platform marketing and ads, what does MFA really offer to the end-user or to a business? As more and more services move into the Cloud, (...)

Everywhere you turn, someone is talking about MFA. When you strip away the jargon, the platform marketing and ads, what does MFA really offer to the end-user or to a business? As more and more services move into the Cloud, (...)

Everywhere you turn, someone is talking about MFA. When you strip away the jargon, the platform marketing and ads, what does MFA really offer to the end-user or to a business? As more and more services move into the Cloud, (...)

Are you struggling with application security testing? Do you wish it was easier, faster, and better? Join us to learn more about IAST, a modern interactive application security testing tool that provides highly accurate, real-time vulnerability results without the need (...)

Are you struggling with application security testing? Do you wish it was easier, faster, and better? Join us to learn more about IAST, a modern interactive application security testing tool that provides highly accurate, real-time vulnerability results without the need (...)

With the current pace of IT complexity, companies are often overwhelmed. The increasing pace with which data and new applications are being created, combined with the complexity of existing infrastructure, have left most IT staff overburdened and unable to keep (...)

There has been a great disturbance to the force. No, we aren’t quoting Star Wars, but we are talking about a shift to larger remote workforces stemming from Covid-19 considerations. As the line between work and home blurs, corporate legal (...)

Times Higher Education (THE) has provided trusted performance data on universities for students and their families, university academics, university leaders, governments and industry, since 2004. THE World University Rankings rely on Scopus and SciVal to measure research productivity and influence (...)

Times Higher Education (THE) has provided trusted performance data on universities for students and their families, university academics, university leaders, governments and industry, since 2004. THE World University Rankings rely on Scopus and SciVal to measure research productivity and influence (...)

There have been countless insider threat breaches recently, it’s no surprise that research suggests that up to 60% of cyberattacks are due to insider threats. With so much at stake, it's vital for organizations to protect against insider threats. (...)

Appropriate use of native security controls in Amazon Web Services, Microsoft Azure, and Google Cloud Platform is essential to managing cloud risk (and avoiding a costly breach). However, many organizations struggle with determining when and how to use these native (...)

Discover how to adopt, migrate, scale and secure a multi-cloud infrastructure.
Adoption of multi cloud is soaring. According to ITPro, 76% of the organisations surveyed reported that they were already using from two to 15 hybrid clouds. The transition to (...)

Discover how to adopt, migrate, scale and secure a multi-cloud infrastructure.
Adoption of multi cloud is soaring. According to ITPro, 76% of the organisations surveyed reported that they were already using from two to 15 hybrid clouds. The transition to (...)

There have been countless insider threat breaches recently, it’s no surprise that research suggests that up to 60% of cyberattacks are due to insider threats. With so much at stake, it's vital for organizations to protect against insider threats. (...)

The unprecedented shift towards remote working caused by the COVID-19 crisis has created significant new IT and cybersecurity challenges. Remote employees working from home need to be managed drastically different than those on a corporate network. Detecting malware, vulnerabilities and (...)